To facilitate investigations across the vast expanses of the open, deep, and dark web, Authentic8 engineers built a guide to 21 easily accessible Open Source Intelligence (OSINT) research tools. The report provides a brief overview of each tool, where and how to get it, a supporting visual, and use case.
Advance...

A quarter of financial institutions experienced at least one spear-phishing or business email compromise attack in 2019 where user credentials were compromised and/or fraud was committed. These attacks also often resulted in intellectual property and physical damage.
Yet, nearly half of institutions surveyed state...

Zero Trust security throws away the idea that we should have a "trusted" internal network and an "untrusted" external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees,...

The explosion of devices and communication channels in recent years presents government with a serious dilemma: How do agencies interact with citizens who increasingly rely on smartphones and tablets for public services? Currently, many agencies use outdated technology for their customer identity and access management...

CDO Technologies is charged with moving the entire Human Resources (A1) data center for the U.S. Air Force to the cloud, including 33 systems, 200 applications, and 5 million users. Due to their extensive experience, industry expertise, and proven capability, CDO chose Okta to assist with security, user experience,...

Ransomware attacks on city, state and local governments are the latest cyberthreat to hit the headlines in force. From Atlanta to Baltimore to cities across Florida and Texas, these attacks present a significant and unique challenge for resource-strapped local government entities. While ransomware is hardly a new...

The notorious carder marketplace Joker's Stash is advertising a fresh batch of 400,00 stolen payment cards issued by both South Korea and U.S. banks, warns Group-IB. It says that on average, stolen APAC payment card data sells for five times more than stolen U.S. payment card data.

Many governments are pursuing contact-tracing apps to combat COVID-19, but such projects risk subjecting populations to invasive, long-term surveillance - as well as insufficient adoption - unless they take an open, transparent and as decentralized approach, says cybersecurity expert Alan Woodward.

Three recently disclosed health data security incidents - including the discovery of a large email hack that happened nearly a year ago - serve as reminders of the ongoing incident response challenges facing healthcare organizations. And these difficulties are likely to worsen during the COVID-19 crisis.

Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. But perhaps it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
There are consequences of cutting back or...

The use of telehealth is ramping up as a result of the COVID-19 pandemic. Now, the latest arrest in connection with a $410 million healthcare fraud case that includes a multi-million dollar telemedicine-related fraud scheme serves as a cautionary tale of how fraudsters can abuse telehealth.

Delivering healthcare is a multifaceted process that requires mental and physical support for patients as well as their families. That's why digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many...

Digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many organizations continue to handle their physical identity and access management through manual processes with data housed in disparate physical...

Connected medical devices are now an integral part of modern healthcare - from pacemakers and insulin pumps to wearable monitoring devices. However, persistent and unmitigated vulnerabilities in the medical device hardware, networks and applications are putting intellectual property, personal data and patient safety...

What are some of the critical considerations for aligning strong security controls with the workflow needs of clinicians? Omar Khawaja, CISO of Highmark Health, which includes health plans and a healthcare delivery system, discusses key issues.

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.